Skip to Content

Steve Van Till authored the ASIS Security Industry Book of the Year

Steve Van Till authored the ASIS Security Industry Book of the Year

LAS VEGAS—ASIS International recognized The Five Technological Forces Disrupting Security: How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical Security in the Digital Age by Steve Van Till, CEO of Brivo, as the 2018 ASIS Security Industry Book of the Year at GSX, held here Sept. 23-27.

The book explores major disruptors of the security industry: cloud, social, mobile, big data, and IoT, the announcement noted. It also provides a high-level perspective on how the security industry is evolving, as well as practical guidance on how to create better security solutions. The author examines key questions on the ways new technologies have lowered barriers for entrants in the field and how they are likely to change market dynamics and affect customer choices. Set in the context of one of the earliest dot.com companies to enter physical security, the narrative is written for professionals from chief security officers and systems integrators to product managers and investors.

“Winning this award is among the highlights of my career,” said Van Till in a prepared statement. “The recognition by the world's largest organization of practicing security professionals means that the subject matter is adding value exactly where I hoped it would—to the actual business of making our world a safer place to live.”

He discussed the book on the GSX expo floor. “Security products are undergoing the same consumerization that swept through IT a decade before,” Van Till said ASIS' announcement. “This time, IoT and cloud, in combination with machine learning techniques, will play a much more significant role in transforming who the players are and what is possible to accomplish.”

The Book of the Year is selected by a panel of ASIS members who review member authored titles using 13 criteria, including relevancy to today's security threats, importance of the subject in the field, and the uniqueness of the coverage of a new security concept, idea, or technology.

Comments

To comment on this post, please log in to your account or set up an account now.